Ten General Security Rules

Before we roll up our sleeves and get into the devilish details of planning and implementing UNIX system security, I'd like to posit ten general rules or themes that I'll return to again and again in this book.